Skip to main content

Showing 1–6 of 6 results for author: Petrova, K

  1. arXiv:2407.01071  [pdf, other

    cs.DS cs.CC cs.DM

    Linear-Time MaxCut in Multigraphs Parameterized Above the Poljak-Turzík Bound

    Authors: Jonas Lill, Kalina Petrova, Simon Weber

    Abstract: MaxCut is a classical NP-complete problem and a crucial building block in many combinatorial algorithms. The famous Edwards-Erdős bound states that any connected graph on n vertices with m edges contains a cut of size at least $m/2 + (n-1)/4$. Crowston, Jones and Mnich [Algorithmica, 2015] showed that the MaxCut problem on simple connected graphs admits an FPT algorithm, where the parameter k is t… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

    Comments: 20 pages

  2. arXiv:2405.07217  [pdf, ps, other

    math.PR cs.SI math.CO

    Improved bounds for polylogarithmic graph distances in scale-free percolation and related models

    Authors: Kostas Lakis, Johannes Lengler, Kalina Petrova, Leon Schiller

    Abstract: In this paper, we study graph distances in the geometric random graph models scale-free percolation SFP, geometric inhomogeneous random graphs GIRG, and hyperbolic random graphs HRG. Despite the wide success of the models, the parameter regime in which graph distances are polylogarithmic is poorly understood. We provide new and improved lower bounds. In a certain portion of the parameter regime, t… ▽ More

    Submitted 14 May, 2024; v1 submitted 12 May, 2024; originally announced May 2024.

    Comments: 21 pages

    MSC Class: 05C82; 60K35; 82B43; 91D30; 91D25

  3. Mobile Data Service Adoption and Use from a Service Supply Perspective: An Empirical Investigation

    Authors: Krassie Petrova, Stephen G. MacDonell, Dave Parry

    Abstract: The paper presents the findings of an empirical study of the views of a selection of mobile data service (MDS) supply chain participants about anticipated MDS customer requirements and expectations, and about the MDS environment. Applying an inductive thematic analysis approach, the study data are first represented as a thematic map; the thematic map is then used to formulate propositions that con… ▽ More

    Submitted 25 March, 2021; originally announced April 2021.

    Comments: Conference proceeding, 10 pages, 1 figure, 7 tables, 1 appendix

    Journal ref: Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICE-B 2016). Lisbon, Portugal, SCITEPRESS, pp.86-97

  4. arXiv:2012.08042  [pdf

    cs.CR

    Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach

    Authors: Noah Oghenfego Ogwara, Krassie Petrova, Mee Loong, Yang, Stephen G. MacDonell

    Abstract: This paper reviews existing Intrusion Detection Systems (IDS) that target the Mobile Cloud Computing (MCC), Cloud Computing (CC), and Mobile Device (MD) environment. The review identifies the drawbacks in existing solutions and proposes a novel approach towards enhancing the security of the User Layer (UL) in the MCC environment. The approach named MINDPRES (Mobile- Cloud Intrusion Detection and P… ▽ More

    Submitted 14 December, 2020; originally announced December 2020.

    Comments: 9 pages, 1 figure, 1 table, conference

  5. arXiv:1809.06727  [pdf, ps, other

    cs.DS cs.DM cs.MA math.CO

    Optimal strategies for patrolling fences

    Authors: Bernhard Haeupler, Fabian Kuhn, Anders Martinsson, Kalina Petrova, Pascal Pfister

    Abstract: A classical multi-agent fence patrolling problem asks: What is the maximum length $L$ of a line that $k$ agents with maximum speeds $v_1,\ldots,v_k$ can patrol if each point on the line needs to be visited at least once every unit of time. It is easy to see that $L = α\sum_{i=1}^k v_i$ for some efficiency $α\in [\frac{1}{2},1)$. After a series of works giving better and better efficiencies, it was… ▽ More

    Submitted 12 June, 2019; v1 submitted 18 September, 2018; originally announced September 2018.

    Comments: 19 pages, 3 figures. Part of our main result (circle strategy) is new to this version of the paper. A shorter version of this is to appear in the proceedings of ICALP 2019

  6. arXiv:1407.4186  [pdf

    cs.SE cs.CY

    Bridging the Research-Practice Gap in Requirements Engineering through Effective Teaching and Peer Learning

    Authors: Andrew M. Connor, Jim Buchan, Krassie Petrova

    Abstract: In this paper, we introduce the concept of the research practice gap as it is perceived in the field of software requirements engineering. An analysis of this gap has shown that two key causes for the research-practice gap are lack of effective communication and the relatively light coverage of requirements engineering material in University programmes. We discuss the design and delivery of a Mast… ▽ More

    Submitted 15 July, 2014; originally announced July 2014.

    Comments: Proceedings of the 6th International Conference on Information Technology: New Generations (ITNG 2009)